Sciweavers

582 search results - page 113 / 117
» Security and Privacy Challenges in Cloud Computing Environme...
Sort
View
ICPR
2006
IEEE
14 years 8 months ago
A Non-Iterative Approach to Reconstruct Face Templates from Match Scores
Regeneration of biometric templates from match scores has security and privacy implications related to any biometric based authentication system. In this paper, we propose a novel...
Pranab Mohanty, Rangachar Kasturi, Sudeep Sarkar
MOBISYS
2010
ACM
13 years 10 months ago
PRISM: platform for remote sensing using smartphones
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, w...
Tathagata Das, Prashanth Mohan, Venkata N. Padmana...
OOPSLA
2005
Springer
14 years 1 months ago
Estimating software based on use case points
It is well documented that software product cost estimates are notoriously inaccurate across the software industry. Creating accurate cost estimates for software product developme...
Edward R. Carroll
GPCE
2007
Springer
14 years 1 months ago
Oz/K: a kernel language for component-based open programming
Programming in an open environment remains challenging because it requires combining modularity, security, concurrency, distribution, and dynamicity. In this paper, we propose an ...
Michael Lienhardt, Alan Schmitt, Jean-Bernard Stef...
ATAL
2004
Springer
14 years 1 months ago
Framework to Control Emergent Survivability of Multi Agent Systems
As the science of multi-agent systems matures, many developers are looking to deploy mission critical applications on distributed multi-agent systems (DMAS). Due to their distribu...
Aaron Helsinger, Karl Kleinmann, Marshall Brinn